@inproceedings{e7986fb40ee141dabc1ce8f31adc888a,
title = "Integrity verification of replicated file with proxy in cloud computing",
abstract = "In 2013, Wang designed an efficient proxy provable data possession scheme. However, Wang{\textquoteright}s scheme focuses on a single copy of the file and the client just delegates the integrity checking task to only one proxy, not multiple ones. In this paper, we extend Wang{\textquoteright}s scheme to apply to multiple replicas. We propose two proxy multiple-replica provable data possession schemes. In the first scheme, the client delegates the integrity checking task to only one proxy. In the second scheme, multiple proxies form a group, and the client delegates the integrity checking task to this group. In the two proposed schemes, only the client and the proxy (proxies) can guarantee that multiple replicas are correctness. Finally, we analyze the security and performance of the two schemes.",
keywords = "Cloud computing, Cloud security, Data integrity, Multiple-replica",
author = "Enguang Zhou and Jiangxiao Zhang and Zhoujun Li and Chang Xu",
note = "Publisher Copyright: {\textcopyright} Springer International Publishing Switzerland 2015.; 2nd International Conference on Cloud Computing and Big Data, CloudCom-Asia 2015 ; Conference date: 17-06-2015 Through 19-06-2015",
year = "2015",
doi = "10.1007/978-3-319-28430-9_26",
language = "English",
isbn = "9783319284293",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "344--353",
editor = "Ching-Hsien Hsu and Weizhong Qiang and Xianghan Zheng",
booktitle = "Cloud Computing and Big Data - 2nd International Conference, CloudCom-Asia 2015, Revised Selected Papers",
address = "Germany",
}